• Trends
  • Topics
  • Nodes
Search for keywords, #hashtags, $sites, add a dash to exclude, e.g. -$theonion.com

From kayssel.com

selfdestruct Unleashed: How to Hack Smart Contracts and Fix Them

1 1

Explore how Ethereum’s powerful selfdestruct function can be exploited to bypass deposit restrictions and drain smart contract funds. This guide breaks down a real-world attack, explains the vulnerability, and provides actionable steps to secure contracts against similar exploits.

#web3 #hacking #infosec #pentesting #cybersecurity #smartcontracts

on Feb 16

From kayssel.com

Kayssel

0 0

Offensive Security Documentation by Ruben Santos Garcia

on Sun, 10AM

From kayssel.com

Fuel for the Ritual: Gas Mechanics and Misfires in Web3

0 0

Learn how poor gas management can break smart contracts, open attack vectors, and waste resources. We explore real examples, test cases, and practical tips to help you audit and optimize gas usage like a pro—without burning your mana.

on Mar 30

From kayssel.com

Hacking ERC-20: Pentesting the Most Common Ethereum Token Standard

0 0

ERC-20 tokens power Ethereum, but poor implementations can be riddled with vulnerabilities. From integer overflows to reentrancy and front-running attacks, pentesters must scrutinize contracts. This chapter explores key flaws, exploits, and Foundry-based testing to break and secure ERC-20 tokens. 🚀

on Mar 2

From kayssel.com

Secrets in the Open: Unpacking Solidity Storage Vulnerabilities

0 0

This chapter explores Solidity's storage vulnerabilities, showcasing how attackers exploit them and proposing solutions like hashing, off-chain storage, and dynamic secrets to secure smart contracts.

on Jan 5

From kayssel.com

Simulating Front-Running Attacks in Ethereum: A Deep Dive with Foundry and Anvil

0 0

This article explores front-running vulnerabilities in Ethereum smart contracts using the BiomechanicalRace case study. It simulates attacks with Anvil, Cast, and a custom validator, analyzing gas price impacts and proposing secure design solutions like commit-reveal schemes to prevent exploits.

on Dec 1

From kayssel.com

The Traitor Within: Reentrancy Attacks Explained and Resolved

0 0

This chapter explores reentrancy attacks in Ethereum, showcasing vulnerabilities in smart contracts and how they can be exploited using Foundry for testing. We demonstrate the attack strategy, implement a fix to secure the contract, and emphasize best practices for robust Solidity development.

on Nov 24

From kayssel.com

Refunds Gone Wrong: How Access Control Flaws Can Drain Your Contract

0 0

This article explores a smart contract access control vulnerability using the Magic Item Shop example. By demonstrating an exploit due to missing ownership checks, we highlight the importance of verifying caller authorization, rigorous testing, and secure coding practices to protect contracts.

on Nov 17

From kayssel.com

Exploiting Predictable Randomness in Ethereum Smart Contracts

0 0

This chapter examines how attackers can exploit predictable randomness in a lottery contract, using Ganache to simulate the attack. It highlights the vulnerability of on-chain randomness and suggests secure solutions like Chainlink VRF.

on Nov 10

From kayssel.com

Pentesting Web3: Setting Up a Smart Contract Testing Environment

0 0

Web3 transforms the internet with decentralization via blockchain, empowering users over data and security. This article covers blockchain basics, smart contracts, security risks, common vulnerabilities, and lays groundwork for upcoming articles on Web3 attacks and secure development practices

on Nov 3

From kayssel.com

Patching Native Libraries for Frida Detection Bypass

0 0

In this chapter, we learned to patch a native library to bypass Frida detection. We explored decompiling the APK, modifying the detection function’s flow, recompiling the APK, and testing the bypass, highlighting the limits of basic obfuscation.

on Oct 27

From kayssel.com

Securing Biometric Authentication: Defending Against Frida Bypass Attacks

0 0

This article explains how attackers use Frida to bypass biometric authentication and how to defend against it. By understanding the Android Keystore, CryptoObject, and encryption, we implement security measures to protect sensitive data and strengthen biometric authentication in Android apps.

on Sep 29

From kayssel.com

Cracking Android Biometric Authentication with Frida

0 0

In this chapter of the Android pentesting series, we implemented local authentication using the BiometricPrompt API and demonstrated how it can be bypassed using Frida on a rooted emulator. We highlighted the importance of securing authentication to prevent bypass attacks.

on Sep 15

From kayssel.com

Linking with Confidence: Securing Deep Links in Android Applications

0 0

Explore the power and security of deep links in Android. Understand traditional and app links, identify vulnerabilities, and learn to exploit them using the "InsecureShop" app. Secure your deep links with URL validation, strict intent filters, and HTTPS to protect against potential threats.

on Aug 4

From kayssel.com

Mastering Android Activity Hacking: Techniques and Tools

0 0

This article explores using Objection to investigate and manipulate Android activities. It highlights uncovering hidden features, exploiting vulnerabilities like insecure JWTs, and the importance of securing applications to protect against significant security risks.

on Jul 7

From kayssel.com

Cracking the Code: Exploring Reverse Engineering and MobSF for Mobile App Security

0 0

In this chapter, we decoded server responses through APK reverse engineering, uncovering obfuscation techniques. We also introduced MobSF for automated security analysis, identifying vulnerabilities and enhancing the security posture of mobile applications.

on Jun 26

From kayssel.com

Exploring Android File System and Log Vulnerabilities

0 0

In this chapter, we explored Android file system security using the com.app.damnvulnerablebank app. We identified JWT vulnerabilities and analyzed key directories. Next, we'll examine the app's encryption algorithm to see if we can access other users' data using JWTs.

on Jun 25

From kayssel.com

Comprehensive Android Security Testing: Patching, Objection, and API Backend

0 0

This article explores advanced Android pentesting: patching apps to bypass security, using Objection for real-time inspection, and configuring backends with Docker Compose. These techniques enable deeper analysis and better vulnerability detection.

on May 27

From kayssel.com

Mastering Mobile Security: A Guide with Damn Vulnerable Bank

0 0

The article discusses using "Damn Vulnerable Bank" to teach mobile app security, focusing on setup, OWASP guidelines, and tools like APKTool and Frida for practical insights.

on May 12

From kayssel.com

From Chaos to Clarity: The Art of Fuzzing with Nuclei

0 0

Embarking on a cybersecurity journey, we explore creating custom Nuclei templates for detecting SQLi in POST requests, leveraging mitmproxy for testing. This endeavor enhances our digital defenses by merging Nuclei's precision with fuzzing's unpredictability.

on Apr 21

From kayssel.com

Harnessing the Power of Nuclei: A Guide to Advanced Vulnerability Scanning

0 0

Nuclei, a standout in cybersecurity, offers template-driven vulnerability scanning. Enhanced by community collaboration, it's crucial for proactive defense. For deeper insights, visit Project Discovery's guide to unlock Nuclei's full potential and stay ahead in cybersecurity.

on Apr 7, 2024

From kayssel.com

From Novice to Ninja: Proxy Techniques in Pentesting

0 0

Embark on a voyage through proxy-powered web penetration testing. From configuring mitmproxy to uncovering vulnerabilities in real-world applications, discover the tools and tactics essential for navigating the ever-evolving cybersecurity landscape.

on Mar 24, 2024

From kayssel.com

API Safeguards: Mastering Rate Limiting and GraphQL Security

0 0

Exploring API security, this chapter covers rate limiting in REST APIs and dives into GraphQL vulnerabilities. It includes setting up a "Damn Vulnerable GraphQL Application" lab, testing with Altair, and emphasizes the importance of robust security measures in API design and testing.

on Mar 17, 2024

From kayssel.com

The Art of Fuzzing: Navigating Web Security with Advanced Testing Strategies

0 0

Explore fuzzing in web pen testing, from uncovering directories to attacking login portals and finding vulnerabilities, utilizing tools like ffuf.

on Mar 10, 2024

From kayssel.com

Katana in Action: Enhancing Security Audits Through Effective Web Crawling

0 0

Explore advanced crawling techniques for web security audits, focusing on tools like Katana and proxies to uncover hidden vulnerabilities and secure web applications effectively.

on Mar 3, 2024

From kayssel.com

Web Application Hacking Fundamentals: Starting the Journey

0 0

We delve into web app hacking basics, covering essential tools, OWASP Juice Shop lab setup, and key skills in Linux, Python, and security. The first step towards mastering web security.

on Mar 1, 2024